GitHub监控消息提醒!!!
更新了:钓鱼
描述:针对钓鱼攻击的实时检测需求,本文提出一种轻量级恶意URL检测框架。该方案采用XGBoost模型结合SHAP解释器,仅提取18维静态统计特征,即实现0.9995的AUC值,显著优于逻辑回归基准。在低配置云环境中,系统吞吐量超过42.8万TPS,平均延迟仅0.0024毫秒,同时通过特征归因分析保障决策可解释性,适用于边缘网关实时流量过滤。
URL:https://github.com/YanFei-L/L_URL-Detection
标签:#钓鱼
更新了:钓鱼
描述:针对钓鱼攻击的实时检测需求,本文提出一种轻量级恶意URL检测框架。该方案采用XGBoost模型结合SHAP解释器,仅提取18维静态统计特征,即实现0.9995的AUC值,显著优于逻辑回归基准。在低配置云环境中,系统吞吐量超过42.8万TPS,平均延迟仅0.0024毫秒,同时通过特征归因分析保障决策可解释性,适用于边缘网关实时流量过滤。
URL:https://github.com/YanFei-L/L_URL-Detection
标签:#钓鱼
GitHub
GitHub - YanFei-L/L_URL-Detection: 针对钓鱼攻击的实时检测需求,本文提出一种轻量级恶意URL检测框架。该方案采用XGBoost模型结合SHAP解释器,仅提取18维静态统计特征,即实现0.9995的AUC值,显著优于逻辑…
针对钓鱼攻击的实时检测需求,本文提出一种轻量级恶意URL检测框架。该方案采用XGBoost模型结合SHAP解释器,仅提取18维静态统计特征,即实现0.9995的AUC值,显著优于逻辑回归基准。在低配置云环境中,系统吞吐量超过42.8万TPS,平均延迟仅0.0024毫秒,同时通过特征归因分析保障决策可解释性,适用于边缘网关实时流量过滤。 - YanFei-L/L_URL-Detection
GitHub监控消息提醒!!!
更新了:RCE
描述:Heap technique that bypasses modern glibc protections via UAF-write and safe-unlinking to write libc addresses into tcache, enabling stdout FILE structure overlap for leak and RCE.
URL:https://github.com/4f3rg4n/House-of-Eggs
标签:#RCE
更新了:RCE
描述:Heap technique that bypasses modern glibc protections via UAF-write and safe-unlinking to write libc addresses into tcache, enabling stdout FILE structure overlap for leak and RCE.
URL:https://github.com/4f3rg4n/House-of-Eggs
标签:#RCE
GitHub
GitHub - 4f3rg4n/House-of-Eggs: Heap technique that bypasses modern glibc protections via UAF-write and safe-unlinking to write…
Heap technique that bypasses modern glibc protections via UAF-write and safe-unlinking to write libc addresses into tcache, enabling stdout FILE structure overlap for leak and RCE. - 4f3rg4n/House-...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一个基于 FastAPI + React 的企业级资产管理和关系图谱可视化平台 专为渗透测试团队、安全研究人员和红队打造
URL:https://github.com/bilisheep/ExternalHound
标签:#渗透测试
更新了:渗透测试
描述:一个基于 FastAPI + React 的企业级资产管理和关系图谱可视化平台 专为渗透测试团队、安全研究人员和红队打造
URL:https://github.com/bilisheep/ExternalHound
标签:#渗透测试
GitHub
GitHub - bilisheep/ExternalHound: 一个基于 FastAPI + React 的企业级资产管理和关系图谱可视化平台 专为渗透测试团队、安全研究人员和红队打造
一个基于 FastAPI + React 的企业级资产管理和关系图谱可视化平台 专为渗透测试团队、安全研究人员和红队打造 - bilisheep/ExternalHound
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw.
URL:https://github.com/absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw.
URL:https://github.com/absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass
标签:#CVE-2026
GitHub
GitHub - absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass: CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory…
CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw. - absho...
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457-TP-Link-VIGI-C385-Authenticated-Remote-Code-Execution
标签:#RCE
更新了:RCE
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457-TP-Link-VIGI-C385-Authenticated-Remote-Code-Execution
标签:#RCE
GitHub
GitHub - ii4gsp/CVE-2026-1457-TP-Link-VIGI-C385-Authenticated-Remote-Code-Execution: CVE-2026-1457 is an authenticated buffer overflow…
CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE). - i...
GitHub监控消息提醒!!!
更新了:信息收集
描述:本仓库用于记录和分享本人 Hack The Box(HTB)靶场实战笔记, 围绕信息收集、漏洞利用、权限提升及攻击路径构建等环节, 系统化总结攻防思路与技术要点。
URL:https://github.com/joohnny157/HackTheBox-notes
标签:#信息收集
更新了:信息收集
描述:本仓库用于记录和分享本人 Hack The Box(HTB)靶场实战笔记, 围绕信息收集、漏洞利用、权限提升及攻击路径构建等环节, 系统化总结攻防思路与技术要点。
URL:https://github.com/joohnny157/HackTheBox-notes
标签:#信息收集
GitHub
joohnny157/HackTheBox-notes
本仓库用于记录和分享本人 Hack The Box(HTB)靶场实战笔记, 围绕信息收集、漏洞利用、权限提升及攻击路径构建等环节, 系统化总结攻防思路与技术要点。 - joohnny157/HackTheBox-notes
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw.
URL:https://github.com/SimoesCTT/CTT-Kernel-Resonance-io_uring-Temporal-Phase-Transition
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24858 FortiCloud Single Sign On (SSO) a factory default enabled feature once you register any FortiGate/FortiManager/FortiAnalyzer contains a critical authentication bypass flaw.
URL:https://github.com/SimoesCTT/CTT-Kernel-Resonance-io_uring-Temporal-Phase-Transition
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/CTT-Kernel-Resonance-io_uring-Temporal-Phase-Transition: CVE-2026-24102 is a Use-After-Free (UAF) vulnerability…
CVE-2026-24102 is a Use-After-Free (UAF) vulnerability within the Linux Kernel io_uring subsystem. While traditional exploits attempt to win a race condition through brute-force CPU pinning, Simoes...
👍1
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE).
URL:https://github.com/ii4gsp/CVE-2026-1457
标签:#CVE-2026
GitHub
GitHub - ii4gsp/CVE-2026-1457: CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385…
CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE). - i...
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:该系统是一款面向安全开发流程的漏洞扫描器,用于自动识别软件中的安全漏洞。系统具备代码分析、漏洞匹配、风险评估等功能模块,采用深度学习技术,可高效识别和报告安全风险。支持多种编程语言和框架,辅助开发者提升软件安全性。
URL:https://github.com/3886370410/JtpUaUovFg
标签:#漏洞扫描
更新了:漏洞扫描
描述:该系统是一款面向安全开发流程的漏洞扫描器,用于自动识别软件中的安全漏洞。系统具备代码分析、漏洞匹配、风险评估等功能模块,采用深度学习技术,可高效识别和报告安全风险。支持多种编程语言和框架,辅助开发者提升软件安全性。
URL:https://github.com/3886370410/JtpUaUovFg
标签:#漏洞扫描
GitHub
GitHub - 3886370410/JtpUaUovFg: 该系统是一款面向安全开发流程的漏洞扫描器,用于自动识别软件中的安全漏洞。系统具备代码分析、漏洞匹配、风险评估等功能模块,采用深度学习技术,可高效识别和报告安全风险。支持多种编程语言和框架,辅助开发者提升软件安全性。
该系统是一款面向安全开发流程的漏洞扫描器,用于自动识别软件中的安全漏洞。系统具备代码分析、漏洞匹配、风险评估等功能模块,采用深度学习技术,可高效识别和报告安全风险。支持多种编程语言和框架,辅助开发者提升软件安全性。 - 3886370410/JtpUaUovFg
GitHub监控消息提醒!!!
更新了:CVE-2026
描述: AsyncIO Scanner & Exploitation Framework for CVE-2026-24061 (Telnet NEW_ENVIRON Auth Bypass). Features high-concurrency discovery, passive fingerprinting, and authorized root shell escalation
URL:https://github.com/ridpath/Terrminus-CVE-2026-2406
标签:#CVE-2026
更新了:CVE-2026
描述: AsyncIO Scanner & Exploitation Framework for CVE-2026-24061 (Telnet NEW_ENVIRON Auth Bypass). Features high-concurrency discovery, passive fingerprinting, and authorized root shell escalation
URL:https://github.com/ridpath/Terrminus-CVE-2026-2406
标签:#CVE-2026
GitHub
GitHub - ridpath/Terrminus-CVE-2026-2406
Contribute to ridpath/Terrminus-CVE-2026-2406 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CTT-Terrminus-Vortex (CVE-2026-2406)
URL:https://github.com/SimoesCTT/CTT-Sovereign-Vortex
标签:#CVE-2026
更新了:CVE-2026
描述:CTT-Terrminus-Vortex (CVE-2026-2406)
URL:https://github.com/SimoesCTT/CTT-Sovereign-Vortex
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/CTT-Sovereign-Vortex: CTT-Terrminus-Vortex (CVE-2026-2406)
CTT-Terrminus-Vortex (CVE-2026-2406). Contribute to SimoesCTT/CTT-Sovereign-Vortex development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare Turnstile 验证码
URL:https://github.com/XCQ0607/katabump
标签:#绕过
更新了:绕过
描述:用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare Turnstile 验证码
URL:https://github.com/XCQ0607/katabump
标签:#绕过
GitHub
GitHub - XCQ0607/katabump: 用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare…
用于自动续期 Katabump 服务器的自动化脚本。它利用 Playwright 和 CDP (Chrome DevTools Protocol) 技术来模拟用户操作,能够有效绕过 Cloudflare Turnstile 验证码 - XCQ0607/katabump
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-Refraction-Vortex-CVE-2026-7731-
标签:#CVE-2026
更新了:CVE-2026
描述:🛠️ Exploit CVE-2026-21858 to demonstrate a full unauthenticated RCE chain in n8n, showcasing vulnerabilities and potential risks in affected versions.
URL:https://github.com/SimoesCTT/CTT-Refraction-Vortex-CVE-2026-7731-
标签:#CVE-2026
GitHub
GitHub - SimoesCTT/CTT-Refraction-Vortex-CVE-2026-7731-: Under CTT, we see it as a Temporal Synchronization Mismatch between the…
Under CTT, we see it as a Temporal Synchronization Mismatch between the Identity Provider and the Service Provider. By injecting a pulse at the \alpha=0.0302011 frequency, we don't bypass t...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and malspam Evidence
URL:https://github.com/ryan-har-plymouth/comp3010hk-set-exercise
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and malspam Evidence
URL:https://github.com/ryan-har-plymouth/comp3010hk-set-exercise
标签:#Cobalt Strike
GitHub
GitHub - ryan-har-plymouth/comp3010hk-set-exercise: Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and…
Intrusion Analysis – HTTP-delivered archive leading to Cobalt Strike C2 and malspam Evidence - ryan-har-plymouth/comp3010hk-set-exercise
GitHub监控消息提醒!!!
更新了:RCE
描述:Laravel < 8.4.2 RCE exploit
URL:https://github.com/crypt0lith/laravel-rce
标签:#RCE
更新了:RCE
描述:Laravel < 8.4.2 RCE exploit
URL:https://github.com/crypt0lith/laravel-rce
标签:#RCE
GitHub
GitHub - crypt0lith/laravel-rce: Laravel < 8.4.2 RCE exploit
Laravel < 8.4.2 RCE exploit. Contribute to crypt0lith/laravel-rce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:深度学习目标检测算法YOLOV8如何训练无人机搜救人员数据集 如何应用与灾害应急响应、AI智能搜救、无人机自主识别人员检测 无人机航拍行人检测数据集
URL:https://github.com/QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas
标签:#应急响应
更新了:应急响应
描述:深度学习目标检测算法YOLOV8如何训练无人机搜救人员数据集 如何应用与灾害应急响应、AI智能搜救、无人机自主识别人员检测 无人机航拍行人检测数据集
URL:https://github.com/QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas
标签:#应急响应
GitHub
GitHub - QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas: 深度学…
深度学习目标检测算法YOLOV8如何训练无人机搜救人员数据集 如何应用与灾害应急响应、AI智能搜救、无人机自主识别人员检测 无人机航拍行人检测数据集 - QQ767172261/Deep-learning-target-detection-algorithm-YOLOV8-How-to-train-drone-search-and-rescue-personnel-datas
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:POC in python for CVE-2026-2461
URL:https://github.com/destiny-creates/CVE-2026-2461-poc
标签:#CVE-2026
更新了:CVE-2026
描述:POC in python for CVE-2026-2461
URL:https://github.com/destiny-creates/CVE-2026-2461-poc
标签:#CVE-2026
GitHub
GitHub - destiny-creates/CVE-2026-2461-poc: POC in python for CVE-2026-2461
POC in python for CVE-2026-2461. Contribute to destiny-creates/CVE-2026-2461-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:Scanner for CVE-2026-24061
URL:https://github.com/buzz075/CVE-2026-24061
标签:#CVE-2026
更新了:CVE-2026
描述:Scanner for CVE-2026-24061
URL:https://github.com/buzz075/CVE-2026-24061
标签:#CVE-2026
GitHub
GitHub - buzz075/CVE-2026-24061: Scanner for CVE-2026-24061
Scanner for CVE-2026-24061. Contribute to buzz075/CVE-2026-24061 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2026
描述:CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
URL:https://github.com/otakuliu/CVE-2026-24841_Range
标签:#CVE-2026
更新了:CVE-2026
描述:CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
URL:https://github.com/otakuliu/CVE-2026-24841_Range
标签:#CVE-2026
GitHub
GitHub - otakuliu/CVE-2026-24841_Range: CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的
CVE-2026-24841仿真靶场,用来模拟真实环境,适合搭建Dokploy报错而无法搭建的. Contribute to otakuliu/CVE-2026-24841_Range development by creating an account on GitHub.
Forwarded from Channel Help
【N1国际】打造全球🔤 投No.1 |实力认证 |值得信赖
😀 😀 😀 😀 😀 😀 超高爆率!开启您的财富之旅
😀 注册网址: N10849.com
TG全网最大信誉平台 玩家首选最权威综合🔤 台
😘 😘 😘 😘 😘 😘 😘 😘 😘 😘 😘 😘
😀 U投No.1平台 N1 U投首选平台 🔤 1️⃣
😀 每日返水😀 😀 😀 返水无上限 大额无忧!
气运之子:PP电子麻将大胜3玩家用 8080盈利56万U😀
电子大水:PG电子麻将胡了玩家免费旋转 爆90万U😀
麻将大水:PG电子麻将胡了2 满屏红中 爆71万U😀
【#N1国际|全网福利天花板】
每日存款,彩金每日送不停,😀 😀 😀 😀 😀 😀 😀
支持😙 😏 USDT 存出款 电子超大水 #电子百家乐0审核包出款
😳 😁 😉 😚 无风控 免实名 无需手机号
😀 N1 国际 欢迎各大园区盘总娱乐 除了出款稳,出款快,返水高的优点,也没其他的优势。😀 福利优惠多多
📱 N1官方网址: N10849.com
📱 N1申请客服: @N1VIPKF
📱 N1活动频道: @N1SVIP
😁 😀 😀 😀 😀 😀 8️⃣ 8️⃣ 1️⃣ 1️⃣
TG全网最大信誉平台 玩家首选最权威综合
气运之子:PP电子麻将大胜3玩家用 8080盈利56万U
电子大水:PG电子麻将胡了玩家免费旋转 爆90万U
麻将大水:PG电子麻将胡了2 满屏红中 爆71万U
【#N1国际|全网福利天花板】
首存5000 赠送彩金588
首存1万 赠送彩金1288
首存5万 赠送彩金5888
首存10万 赠送彩金8888
首存20万 赠送彩金12888
每日存款,彩金每日送不停,
支持
Please open Telegram to view this post
VIEW IN TELEGRAM